2012 IEEE International Conference on RFID-Technologies and Applications (RFID-TA) 2012
DOI: 10.1109/rfid-ta.2012.6404558
|View full text |Cite
|
Sign up to set email alerts
|

Enforcing RFID data visibility restrictions using XACML security policies

Abstract: Abstract-Radio Frequency Identification (RFID) technology allows automatic data capture from tagged objects moving in a supply chain. This data can be very useful if it is used to answer traceability queries, however it is distributed across many different repositories, owned by different companies.Discovery Services (DS) are designed to assist in retrieving the RFID data relevant for traceability queries while enforcing sharing policies that are defined and required by participating companies to prevent sensi… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
7
0

Year Published

2012
2012
2014
2014

Publication Types

Select...
2

Relationship

1
1

Authors

Journals

citations
Cited by 2 publications
(7 citation statements)
references
References 16 publications
0
7
0
Order By: Relevance
“…The Supply Chain Authorization (SC-Az) Application Programming Interface (API) has been proposed recently [27] to allow companies participating in a supply chain to express their authorizations using business concepts such as item, company, etc. ; and then to enforce the resulting policies using alternative underlying mechanisms.…”
Section: A Extensible Access Control Markup Languagementioning
confidence: 99%
See 2 more Smart Citations
“…The Supply Chain Authorization (SC-Az) Application Programming Interface (API) has been proposed recently [27] to allow companies participating in a supply chain to express their authorizations using business concepts such as item, company, etc. ; and then to enforce the resulting policies using alternative underlying mechanisms.…”
Section: A Extensible Access Control Markup Languagementioning
confidence: 99%
“…The policy master copy is maintained at the EPC DS, but a local copy is maintained in each IS to also protect its records locally. 5 The conversion of EAC and CCT to XACML is described in [27].…”
Section: Deploymentmentioning
confidence: 99%
See 1 more Smart Citation
“…[2][3]. Therefore DS must authenticate the user's identity first before this user is allowed to access DS [4].…”
Section: Introductionmentioning
confidence: 99%
“…The user identity authentication for DS is a crucial problem. By analyzing the application scenarios and relevant literatures [2][3][4][5], we summarize the following important requirements of the user identity authentication scheme for DS:…”
Section: Introductionmentioning
confidence: 99%